This research deals with one scene from the movie Romeo and Juliet, which is the balcony scene, due to the importance of this scene in the formation of the construction of the subsequent events of the movie.
The first chapter contained the methodological framework of the research, where the research problem was identified in how Zeffirelli dealt with the balcony scene in the play Romeo and Juliet and enriched it in the cinematic language with a comparison with the original text of the scene. In the balcony scene with comparative parts between the film and the text and the limits of the research that was limited to the film Zeffirelli and the translated text by Munis Taha Hussein.
The second chapter contained the theoretic
... Show MoreAfter a temporary halt to forced thghebr in different cities of Iraq this methodlogy
opeations returned directiy in the areas of political conflict on the ground which are translated
operations and forced displacement violence es they operations aimed at completing the
forced displacement that occurred after the occupation in(2003)which took an upward curve
publicly after these events and some of which are aimed at the liquidation of some provinces
than any demographic diversity of religious or sectarian or alhens and others aimed at
redemographic distribution within the province itself to produce a net sectarian zones as is the
case in Diyala Nineveh and Babylon Baghdad has the epicenter of sectarian violence and th
The research aims to evaluate the direct deduction department’s procedures for the process of collecting income tax using the direct deduction method for state departments and the public sector in light of direct deduction tax instructions No. (1) of 2007 and Income Tax Law No. (113) of 1982 (amended) through Giving a clear idea of the reality of tax collection procedures because this type of tax is one of great importance because it contributes to the provision of financial revenues to the state to finance its expenses and direct the economy towards achieving its social, economic and political goals. The researcher makes comparisons between the procedures of the General Tax Authority in collecting the tax and what was approved b
... Show MoreBackground: Vitamin D improves innate immunity by enhancing the expression of antimicrobial peptides. The antimicrobial action of cathelicidin is widespread and effective against cariogenic bacteria. This research aimed to investigate the effect of vitamin D deficiency on the level of salivary cathelicidin concerning dental caries experience.
Subjects and Methods: A case-control study was carried out, and the sample was composed of 80 females; the study group involved 40 females with a serum vitamin D concentration of less than 10 ng/ml. In addition to the control group involving 40 females wh
... Show MoreThis research aims to clarify the importance of an accounting information system that uses artificial intelligence to detect earnings manipulation. The research problem stems from the widespread manipulation of earning in economic entities, especially at the local level, exacerbated by the high financial and administrative corruption rates in Iraq due to fraudulent accounting practices. Since earning manipulation involves intentional fraudulent acts, it is necessary to implement preventive measures to detect and deter such practices. The main hypothesis of the research assumes that an accounting information system based on artificial intelligence cannot effectively detect the manipulation of profits in Iraqi economic entities. The researche
... Show MoreBackground: Peripheral giant cell lesion (PGCL) and central giant cell lesion (CGCL) of the jaws have a distinct clinical behavior.Giant cell tumour (GCT) is a benign locally aggressive neoplasm affects the long bones. Both lesions are characterized histologically by multinucleated giant cells in a background of ovoid to spindle-shaped mesenchymal cells. The WW domain-containing oxidoreductase (WWOX) gene is located at 16q23.1–16q23.2, a region that spans the second most common human fragile site, FRA16D, at 16q23.2.The Ki-67 antigen is a nuclear protein that is associated with and may be necessary for cellular proliferation.Ki-67 protein is present during all active phases of the cell cycle (G1, S, G2, and mitosis), but is absent fr
... Show MoreAbstract
This research attempt to explain the essential aspects of one important model in management of Bank risks , that is (stress testing) , which increase the concentrate on it resulting the negative affects of Global financial crisis that it accuar in 2008 to study the application possibilities in iraqian banks to enhancing the safety and financial soundness Becuase the classical tools in Risk management don’t give clear image on Banks ability in facing risks, hence the Basel committee on Banking supervision focusing in agreement of Basel 2,3 on stress testing when it doing the internal capital adequacy assessment process (ICAAP) .
To achieving the reseach obje
... Show MoreThe atmospheric air cold plasma has been used to manufacture gold nanomaterials for treating parasitic leishmaniasis. This study experimentally assessed the treatment of Leishmania parasites (L. donovani and L. tropica) by gold nanoparticles. Specifically, atmospheric pressure nonthermal plasma was generated using different diameters (1.0, 2.8, 3.8 and 4.3 mm) of high voltage electrode. Aqueous gold tetrachloride salts (HAuCl4·4H2O) were used as precursor to produce gold nanoparticles. UV-vis spectroscopy and x-ray diffraction were conducted for characterization of the nanoparticles. The optimum condition (a diameter of 1 mm) was chosen to prepare gold nanoparticles, where the grain size was found to be 17 nm. Accordingly, the nanoparticle
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreWireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show More